


default search action
Cryptologia, Volume 37
Volume 37, Number 1, 2013
- Nicolas T. Courtois:
Low-Complexity Key Recovery Attacks on GOST Block Cipher. 1-10 - Saul Kelly:
Room 47: The Persian Prelude to the Zimmermann Telegram. 11-50 - Fco. Alberto Campos, Alberto Gascón, Jesús María Latorre, José Ramón Soler Fuensanta:
Genetic Algorithms and Mathematical Programming to Crack the Spanish Strip Cipher. 51-68 - Quynh Dang:
Changes in Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard. 69-73 - Joshua Holden
:
Demitasse: A "Small" Version of the Tiny Encryption Algorithm and Its Use in a Classroom Setting. 74-83 - John F. Dooley
:
1929-1931: A Transition Period in U.S. Cryptologic History. 84-98
- Chris Christensen:
Review of Secret Postings: Bletchley Park to the Pentagon by Charlott WebbBook Tower Publishing, Redditch, Worcestershire, UK, 2011, 72 pages, Paperback, £6.99. ISBN 978-0-9557164-1-6. 99-101 - Chris Christensen:
Review of Introduction to Cryptography with Mathematical Foundations and Computer Implementation by Alexander StanoyevitchChapman and Hall/CRC, Boca Raton, FL, 2010, 699 pages, Hardcover, $89.95. ISBN 1439817634. 102-104
Volume 37, Number 2, 2013
- Chris Christensen:
Announcement of the 2013 Cryptologic History Symposium "Technological Change and Cryptology: Meeting the Historical Challenges" 17-18 October 2013. 105-106
- Joshua Holden
:
A Good Hash Function is Hard to Find, and Vice Versa. 107-119 - Samantha Campbell, Max Grinchenko, William Smith:
Linear Cryptanalysis of Simplified AES Under Change of S-Box. 120-138 - Randy Rezabek
:
TICOM and the Search for OKW/Chi. 139-153 - Sachin Kumar, Rajendra Kumar Sharma
:
Recursive Information Hiding of Secrets by Random Grids. 154-161
- Karl de Leeuw:
Review of Forschungsstelle Langeveld: Duits Afluisterstation in bezet Nederland by Hans Knap. 162-166 - Chris Christensen:
Review of Memories of My Work at the Cipher Bureau of the General Staff Second Department 1930-1945 by Marian Rejewski. 167-174 - David Joyner:
Review of Algebraic Shift Register Sequences by Mark Goresky and Andrew Klapper. 175-183 - Chris Christensen:
Review of Decoding Organization: Bletchley Park, Codebreaking and Organization Studies by Christopher Grey. 184-188 - David Joyner:
Review of Cryptographic Boolean Functions and Applications by Thomas Cusick and Pantelimon Stănică. 189-192
Volume 37, Number 3, 2013
- Klaus Schmeh:
A Milestone in Voynich Manuscript Research: Voynich 100 Conference in Monte Porzio Catone, Italy. 193-203 - Jeanne Anderson:
Breaking the BTK Killer's Cipher. 204-209 - William G. Flynn, Sharon Maneki:
The Jack Butcher Case: A Story of Courage, Commitment, and Concern. 210-214 - Todd D. Mateer:
Cryptanalysis of Beale Cipher Number Two. 215-232 - José Ramón Soler Fuensanta, Francisco Javier López-Brea Espiau, Diego Navarro Bonilla:
Revealing Secrets in Two Wars: The Spanish Codebreakers at PC Bruno and PC Cadix. 233-249 - Amrapali Dhavare, Richard M. Low, Mark Stamp
:
Efficient Cryptanalysis of Homophonic Substitution Ciphers. 250-281
- Chris Christensen:
Review of Code Talker by C. Nez (with J. S. Avila). 282-284 - Chris Christensen:
Review of Two Software-Based Textbooks. 285-288
Volume 37, Number 4, 2013
- John Alexander, Kevin Coleman, David White, Nick Miers, John Gallehawk:
Whittingham-Collingwood Cipher Machine. 289-304 - Darren B. Glass:
A First-Year Seminar on Cryptography. 305-310 - William Stallings:
Digital Signature Algorithms. 311-327 - Abdelmalek Azizi
, Mostafa Azizi:
Instances of Arabic Cryptography in Morocco II. 328-337 - Maria Fronczak:
Atbah-Type Ciphers in the Christian Orient and Numerical Rules in the Construction of Christian Substitution Ciphers. 338-344 - Da-Zhi Sun, Zhen-Fu Cao
:
On the Privacy of Khan et al.'s Dynamic ID-Based Remote Authentication Scheme with User Anonymity. 345-355
- Chris Christensen:
Review of Biographies of Alan Turing. 356-367 - David H. Hamer:
Review of Hitler's Codebreakers - German Signals Intelligence in World War 2 by John Jackson. 368-370

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.